Virus, Malware & Spyware Protection

Virus, Malware & Spyware Protection

At any point in time, thousands of computer viruses, malware, adware, spyware and worms are circulating on the Internet. Tens of millions of computer users with always-on broadband connections are ideal targets for identity theft, email attacks and malicious hacker programs.

Cambridge PC Support will ensure that you have effective anti-virus and anti-malware software to reduce the chances of infection. We will also advise on the best way of avoiding infection i.e. be careful with email, instant messengers, adult and gambling web sites, pop-up windows and file-sharing sites.

What is malware? – Malware is short for malicious software and is designed to infiltrate a computer without consent. It is a general term used to cover a variety of nasty software such as viruses, spyware, adware and trojan horses.

What is a worm? – A worm is a self-replicating computer program which use either a network or the Internet to to spread autonomously.

What is a virus? – A virus is a computer program that copies itself and infects a computer. It is spread via a network or the Internet, or carried via floppy disk, CD, DVD, external hard drive or USB drive.

What are trojan horses? – Trojan horses are software that appear to provide a useful function but actually install additional software which allows unauthorized access to a computer. This is usually to allow a hacker remote access to a computer.

What is spyware? – Spyware is a kind of malware that is installed on a computer and collects information about a user without their knowledge. This includes Internet surfing habits. Spyware is usually well hidden from the user and normally difficult to detect. Spyware can also interfere with the computers normal operations such as installing unwanted software and redirecting web browser requests. It can also result in a changed Internet browser home page and also slow computer and Internet activity.

What are rootkits? – Rootkits are software programs that have been specifically designed to compromise a computer system and are very effective at obscurring this. Usually this is achieved by replacing vital system files so that it can hide it’s own processes and files.